RESEARCHER
RESEARCH TITLE
RESEARCHER INFO
Associate Prof. Dr.
Roshidi bin Din
UUM College of Arts and Sciences
Pengkomputeran
roshidi@uum.edu.my
5106
Download CV
RESEARCH PROFILE
Scopus
ORCiD
Research Gate
Google Scholar
ACADEMIC QUALIFICATION
1
2015, PhD Keselamatan Maklumat, USM, Universiti Sains Malaysia
2
1999, Masters Teknologi Maklumat, UUM, Universiti Utara Malaysia
3
1996, Bachelor Degree Teknologi Maklumat, UUM, Universiti Utara Malaysia
AWARD
1
Semarak International Research Article Competition 2024 (SIRAC 2024), Semarak Ilmu Sdn. Bhd., 2024, Antarabangsa
2
Semarak International Research ArticleCompetition 2024 (SIRAC 2024), Semarak Ilmu Sdn. Bhd., 2024, Antarabangsa
3
Semarak International Research ArticleCompetition 2024 (SIRAC 2024), SEMARAK ILMU SDN. BHD., 2024, Antarabangsa
4
Semarak International Research Article Competition 2024 (SIRAC 2024), SEMARAK ILMU SDN. BHD., 2024, Antarabangsa
5
Semarak International Research Article Competition 2024 (SIRAC 2024), SEMARAK ILMU SDN. BHD., 2024, Antarabangsa
6
Outstanding Researcher Award, Computational Intelligence Rescources, 2019, Antarabangsa
7
Best paper Award, Computational Intelligence Resources, 2019, Antarabangsa
8
Excellent Reasearcher Award, Computational Intelligence Resources, 2018, Antarabangsa
9
Excellent Researcher Award, Computational Intelligence Resources, 2018, Antarabangsa
RECOGNITION
1
AKADEMIK,Part Time Lecturer,Antarabangsa,2022
2
ACADEMIC EDITOR,Member of Editorial Borad,Antarabangsa,2025
3
PANEL PENILAI,TECHNICAL COMMITTEE,Antarabangsa,2021
4
AHLI PANEL,Sekretariat CSAM,Kebangsaan,2022
5
EXAMINER OF VIVA,Panel Penilai Tesis Pelajar USIM,Kebangsaan,2022
6
AKADEMIK,SupervisorKe-2 pelajar ijazah PhD,Kebangsaan,2021
7
PANEL PENILAI,Panel Penilai IPT (FRGS),Kebangsaan,2019
8
CYBERSECURITY, Panel Penyemak,Kebangsaan,2023
9
SAINS KOMPUTER,Pakar IT,Kebangsaan,2021
10
PAKAR RUJUK,Penasihat Tesis PhD,Kebangsaan,2022
11
AHLI PANEL,Panel Penilai,Kebangsaan,2023
12
AKADEMIK,PAKAR PERUNDING,Kebangsaan,2018
13
AHLI PANEL,PANEL PENASIHAT LUAR,Kebangsaan,2020
14
PERUNDING,PAKAR PERUNDING,Kebangsaan,2018
15
BUSINESS,LEMBAGA PENASIHAT,Kebangsaan,2020
16
AKADEMIK,PAKAR PERUNDING,Kebangsaan,2018
17
AHLI PANEL,PENILAI MANUSKRIP,Kebangsaan,2020
18
INFORMATION SECURITY,PENASIHAT PROGRAM,Kebangsaan,2019
19
AHLI PANEL,Penilai Dalaman Geran FRGS UUM,Universiti,2022
20
EXAMINER OF VIVA,Penilai tesis PhD_SOC UUM,Universiti,2022
21
AHLI PANEL,Panel Penilai,Universiti,2024
22
AHLI PANEL,Panel Penilai,Universiti,2023
23
FELO PENYELIDIK,Pengerusi JK,Universiti,2022
24
PANEL PENILAI,Panel Penilai UUM,Universiti,2021
25
FELO PENYELIDIK,Felo Penyelidik,Universiti,2022
26
FELO PENYELIDIK,Fellow,Universiti,2020
27
ADVISOR,Penyelia Peljar,Pusat Pengajian/Jabatan,2024
28
ADVISOR,Penyelia Pelajar PhD,Pusat Pengajian/Jabatan,2024
29
PANEL PENILAI,Penilai,Pusat Pengajian/Jabatan,2022
30
AKADEMIK,Ahli MPP,Pusat Pengajian/Jabatan,2022
31
AKADEMIK,Ahli Penyelidik,Pusat Pengajian/Jabatan,2022
32
AHLI PANEL,PENILAI KERTAS CADANGAN FRGS RACERS 1/2029,Pusat Pengajian/Jabatan,2019
33
AHLI PANEL,PANEL PENILAI,Pusat Pengajian/Jabatan,2019
34
MEDIA & ICT,PANEL PENILAI,Pusat Pengajian/Jabatan,2018
35
PANEL PENILAI,PAKAR RUJUK,Pusat Pengajian/Jabatan,2020
36
AHLI PANEL,Penilai Silibus,Pusat Pengajian/Jabatan,2022
AREA OF EXPERTISE
Security Services (Including Digital Forensic, Steganography, Network Security, Public Key Infrastucture And Biometrics)
Cryptography
Soft Computing
RESEARCH AREA
Information Security
Soft Computing In Language Processing
Security System
OVERVIEW
I'm interested in information and system security. I'm also expert in steganography/cryptography through soft computing areas.
PUBLICATION CHART
LIST OF PUBLICATION
Nuramalina binti Mohamad Na'in, Roshidi bin Din, Wan Aida Nadia Binti Wan Abdullah, Nik Fatinah binti N. Mohd Farid, (2024). REVIEW ON LEAKAGE DETECTION MODEL OF WATER DISTRIBUTION SYSTEM FOR NON-REVENUE WATER.
International Journal of Innovation and Industrial Revolution
, 6(16), 85 - 94.
Wan Aida Nadia Binti Wan Abdullah, Roshidi bin Din, Nuramalina binti Mohamad Na'in, Nik Fatinah binti N. Mohd Farid, (2024). NON-REVENUE WATER: IDENTIFYING CHALLENGES AND ANTICIPATING FUTURE SOLUTIONS.
JOURNAL OF TOURISM, HOSPITALITY AND ENVIRONMENT MANAGEMENT
, 9(35), 145 - 154.
ALAA JABBAR QASIM AL, Roshidi bin Din, SUNARIYA UTAMA , (2023). Exploring Effective Attack Strategies on Steganographic Systems.
Borneo International Journal
, 6(4), 67 - 78.
ALAA JABBAR QASIM AL, Roshidi bin Din, SUNARIYA UTAMA , (2023). Information Hiding in Image Using Amplitude Modulation Algorithm.
Borneo International Journal
, 6(4), 60 - 66.
Siti Norussaadah binti Mohd Salleh , Roshidi bin Din, Nur Haryani Binti Zakaria, (2023). A Review of Feature-based Technique in Text-based Steganography.
Borneo International Journal
, 6(4), 16 - 24.
ALAA JABBAR QASIM AL, Osman B Ghazali, Roshidi bin Din, (2023). Comparative Analysis of Methods for Digital Steganography in Images.
Borneo International Journal
, 6(3), 119 - 127.
ALAA JABBAR QASIM AL, Roshidi bin Din, (2023). Comparison Of Steganographic Techniques of Spatial Domain and Frequency Domain in Digital Images.
Borneo International Journal
, 6(3), 109 - 118.
Roshidi bin Din, SUNARIYA UTAMA , (2023). The Design Review of Feature-based Method in Embedding the Hidden Message in Text as the Implementation of Steganography.
Borneo International Journal
, 6(3), 88 - 95.
Roshidi bin Din, SUNARIYA UTAMA , (2023). The Framework Design of Feature-based Method on Single-bit Technique Concealing Process using UML Representative.
Borneo International Journal
, 6(3), 96 - 103.
SUNARIYA UTAMA , Roshidi bin Din, (2022). Performance Review of Feature-Based Method in Implementation Text Steganography Approach.
Journal of Advanced Research in Applied Sciences and Engineering Technology
, 28(2), 325 - 333.
ALAA JABBAR QASIM AL, Roshidi bin Din, (2022). Capacity Performance of LSB Method On Multi-Layer Images in Steganography .
International Journal of Engineering and Techniques
, 8(5), 118 - 121.
Shahrul Azmi bin Mohd. Yusof, Nor Idayu binti Mahat, Jauriyah binti Shamsuddin, Roshidi bin Din, Ayoib bin Che Ahmad, (2022). The Role of Community Managers in Digitizing Small Businesses.
Proceeding of International Conference on Decision Aid Sciences and Applications (DASA)
, (), 863 - 868.
Shahrul Azmi bin Mohd. Yusof, Roshidi bin Din, Nor Idayu binti Mahat, Jauriyah binti Shamsuddin, Ayoib bin Che Ahmad, (2022). ASNAF I-CARE: APLIKASI PENGURUSAN JUAL BELI PRODUK ASNAF ASNAF i-CARE: Asnaf Product Sales Management Application.
International Journal of Zakat and Islamic Philantrophy
, 4(1), 12 - 22.
Reema Thabit,, Nur Izura Udzir, Sharifah Md Yasin, Aziah Asmawi, Nuur Alifah Roslan, Roshidi bin Din, (2021). A Comparative Analysis of Arabic Text Steganography.
Applied Sciences
, 11(15), 16851 - 16883.
Mohd Hilal Muhammad, Hanizan Shaker Hussain, Roshidi bin Din, Hafiza Samad, SUNARIYA UTAMA , (2021). Review on feature-based method performance in text steganography.
Bulletin of Electrical Engineering and Informatics
, 10(1), 427 - 433.
Mohd Saiful Adli Bin Mohamad, Roshidi bin Din, Jasmin Ilyani Ahmad, (2021). Research trends review on RSA scheme of asymmetric cryptography techniques .
Bulletin of Electrical Engineering and Informatics
, 10(1), 487 - 492.
Roshidi bin Din, Reema Ahmed Thabit, Nur Izura Udzir, SUNARIYA UTAMA , (2021). Traid-bit embedding process on arabic text steganography method.
Bulletin of Electrical Engineering and Informatics
, 10(1), 493 - 500.
Azizi bin Abas, Yuhanis binti Yusof, Roshidi bin Din, Fazli Bin Azzali, Baharudin Bin Osman, (2020). Increasing data storage of coloured QR code using compress, multiplexing and multilayered technique.
Bulletin of Electrical Engineering and Informatics
, 9(6), 2555 - 2561.
ALAA JABBAR QASIM AL, Roshidi bin Din, Farah Qasim Ahmed Alyousuf, (2020). Review on Techniques and File Formats of Image Compression.
Bulletin of Electrical Engineering and Informatics
, 9(2), 602 - 610.
Farah Qasim Ahmed Alyousuf, Roshidi bin Din, ALAA JABBAR QASIM AL, (2020). Analysis Review on Feature-Based and Word-Rule Based Techniques in Text Steganography.
Bulletin of Electrical Engineering and Informatics
, 9(2), 764 - 770.
Farah Qasim Ahmed Alyousuf, Roshidi bin Din, ALAA JABBAR QASIM AL, (2020). Analysis Review on Spatial and Transform Domain Technique in Digital Steganography.
Bulletin of Electrical Engineering and Informatics
, 9(2), 573 - 581.
Fawwaz Zamir Mansor, Azizan Ismail, Roshidi bin Din, Aida Mustapha, Noor Azah Samsudin, (2019). Substitution-based Linguistic Steganography based on Antonyms.
Indonesian Journal of Electrical Engineering and Computer Science
, 16(1), 530 - 538.
Roshidi bin Din, ALAA JABBAR QASIM AL, (2019). Steganography analysis techniques applied to audio and image files.
Bulletin of Electrical Engineering and Informatics
, 8(4), 1297 - 1302.
Roshidi bin Din, Rosmadi B Bakar, Azizan Ismail, Aida Mustapha, SUNARIYA UTAMA , (2019). Evaluation review of effectiveness and security metrics performance on information technology domain.
Indonesian Journal of Electrical Engineering and Computer Science
, 17(2), 1059 - 1064.
Syiham Mohd Lokman, Aida Mustapha, Azizan Ismail, Roshidi bin Din, (2019). Analysis Review on Linguistic Steganalysis .
Indonesian Journal of Electrical Engineering and Computer Science
, 17(2), 950 - 956.
Suhaibah Jusoh, Aida Mustapha, Azizan Ismail, Roshidi bin Din, (2020). A Review of Arabic Text Steganography: Past and Present.
Indonesian Journal of Electrical Engineering and Computer Science
, 17(2), 1040 - 1046.
FARAH QASIM AHMED AL, Roshidi bin Din, (2019). Review on Secured Data Capabilities on Cryptography, Steganography, and Watermarking Domain .
Indonesian Journal of Electrical Engineering and Computer Science
, 17(2), 1053 - 1059.
Roshidi bin Din, Massudi bin Mahmuddin, ALAA JABBAR QASIM AL, (2019). Review on Steganography Methods in Multi-Media Domain.
International Journal of Engineering & Technology
, 8(1.7), 288 - 292.
Mohd Iskandar Bin Samsuddin, Mohamad Yusof Darus, Shamsul J Elias, Abidah Hj Mat Taib, Norkhushaini Awang, Roshidi bin Din, (2019). The evaluation of AdBlock technique implementation for enterprise network environment.
Indonesian Journal of Electrical Engineering and Computer Science
, 13(3), 1102 - 1109.
Shapina Abdullah, Norashidah Md Din, Shamsul J Elias, Adam Wong Yoon Khang, Roshidi bin Din, Rosmadi B Bakar, (2019). Design of a cell selection mechanism to mitigate interference for cell-edge macro users in femto-macro heterogeneous network.
Bulletin of Electrical Engineering and Informatics
, 8(1), 180 - 187.
Roshidi bin Din, Rosmadi B Bakar, Raihan Sabirah Binti Mohd Sabri , Mohamad Yusof Darus, Shamsul Jamel Elias, (2019). Performance Analysis on Secured Data Method in Natural Language Steganography .
Bulletin of Electrical Engineering and Informatics
, 8(1), 298 - 304.
Roshidi bin Din, Rosmadi B Bakar, SUNARIYA UTAMA , Jamaluddin Jasmis, Shamsul Jamel Elias, (2019). The evaluation performance of letter-based technique on text steganography system.
Bulletin of Electrical Engineering and Informatics
, 8(1), 291 - 297.
Roshidi bin Din, SUNARIYA UTAMA , (2018). Analysis Review of Feature-Based Method in Term of Verification and Validation Performance.
Journal of Telecommunication, Electronic and Computer Engineering
, 10(2-4), 173 - 177.
Roshidi bin Din, (2018). TREND OF DATA SECURITY TECHNIQUE IN TEXT DOCUMENT: A REVIEW AND ANALYSIS.
Journal of Fundamental and Applied Sciences
, 10(7S), 168 - 182.
Hanizan Shaker Hussain, Roshidi bin Din, Mohd Hanif Ali, Nor Balqis, (2018). The Embedding Performance of StegSVM Model in Image Steganography.
Indonesian Journal of Electrical Engineering and Computer Science
, 12(1), 233 - 238.
Jasmin Ilyani Ahmad, Roshidi bin Din, Mazida Binti Ahmad, (2018). Review on Public Key Cryptography Scheme-Based Performance Metrics.
Indonesian Journal of Electrical Engineering and Computer Science
, 12(1), 386 - 392.
Roshidi bin Din, Osman B Ghazali, ALAA JABBAR QASIM AL, (2018). Analytical Review on Graphical Formats Used in Image Steganographic Compression.
Indonesian Journal of Electrical Engineering and Computer Science
, 12(2), 441 - 446.
Jasmin Ilyani Ahmad , Roshidi bin Din, Mazida Binti Ahmad, (2018). Analysis Review on Public Key Cryptography Algorithms.
Indonesian Journal of Electrical Engineering and Computer Science
, 12(2), 447 - 454.
Fawwaz Zamir Mansor, Aida Mustapha, Roshidi bin Din, Azizi bin Abas, SUNARIYA UTAMA , (2018). An Antonym Substitution-based Model on Linguistic Steganography Method.
Indonesian Journal of Electrical Engineering and Computer Science
, 12(`1), 225 - 232.
Nor Hafizah Binti Abdul Razak, Roshidi bin Din, Mazida Binti Ahmad, (2018). Comparative review on feature-content based of public key steganography trends .
International Journal of Engineering and Technology
, 7(2), 89 - 92.
Roshidi bin Din, (2018). Evaluation Review on Effectiveness and Security Performances of Text Steganography Technique.
Indonesian Journal of Electrical Engineering and Computer Science
, 11(2), 747 - 754.
Roshidi bin Din, (2018). Analysis Review on Performance Metrics for Extraction Schemes in Text Steganography.
Indonesian Journal of Electrical Engineering and Computer Science
, 11(2), 761 - 767.
Siti Norussaadah binti Mohd Salleh , Roshidi bin Din, Nur Haryani Binti Zakaria, Aida Mustapha, (2018). A Review on Structured Scheme Representation on Data Security Application.
Indonesian Journal of Electrical Engineering and Computer Science
, 11(2), 733 - 739.
Roshidi bin Din, , Raihan Sabirah Binti Mohd Sabri , Aida Mustapha, SUNARIYA UTAMA , (2018). A Comparative Review on Data Hiding Schemes.
Indonesian Journal of Electrical Engineering and Computer Science
, 11(2), 768 - 774.
Siti Norussaadah binti Mohd Salleh, Roshidi bin Din, Nur Haryani Binti Zakaria, Aida Mustapha, (2018). A Review on Structured Scheme Representation on Data Security Application.
Proceeding of International Conference on Electrical Engineering and Computing
, 1(1), 15 - 15.
Roshidi bin Din, Raihan Sabirah Binti Mohd Sabri , Aida Mustapha, SUNARIYA UTAMA , (2018). A Comparative Review on Data Hiding Schemes.
Proceeding of International Conference on Electrical Engineering and Computing
, (), 401 - 408.
Roshidi bin Din, SUNARIYA UTAMA , Aida Mustapha, (2018). Evaluation Review on Effectiveness and Security Performances of Text Steganography Technique.
Proceeding of International Conference on Electrical Engineering and Computing
, (), 401 - 409.
Raihan Sabirah Binti Mohd Sabri , Roshidi bin Din, Aida Mustapha, (2018). Analysis Review on Performance Metrics for Extraction Schemes in Text Steganography.
Proceeding of International Conference on Electrical Engineering and Computing
, (), 401 - 407.
Roshidi bin Din, SUNARIYA UTAMA , S. H. Hanizan, MOHD HILAL BIN MUHAMMAD , Mohd Hanif Mohd Ali , Zulhazlin Bin Abas , Mohamad Fazali Bin Ghazali , (2017). Evaluating The Feature-based Technique of Text Steganography Based on Capacity and Time Processing Parameters.
Empowering Community, Advancing Future
, (), - .
Mohd. Nizam Bin Omar, Nur Haryani Binti Zakaria, Angela Amphawan, Roshidi bin Din, (2017). Home-Based Intrusion Detection System.
Journal of Telecommunication, Electronic and Computer Engineering
, 9(2-4), 107 - 111.
H. S. HANIZAN, Roshidi bin Din, HAFIZA A. S, (2017). A REVIEW OF ARTIFICIAL INTELLIGENCE TECHNIQUES IN IMAGE STEGANOGRAPHY DOMAIN.
Journal of Engineering Science and Technology
, 1(4), 103 - 113.
Hanizan Shaker Hussain, Roshidi bin Din, Aida Musthapa, Fawwaz Zamir Mansor, (2017). LSB Algorithm based on Support Vector Machine in Digital Image Steganography.
Journal of Engineering Science and Technology
, 9(2-12), 13 - 18.
Roshidi bin Din, Mohd. Rushdi bin Idrus, (2017). Mathematical Formulation Model of Feature-based Technique on Text Steganography.
ICoBIC 2017
, 1(1), 16 - 16.
Hanizan Shaker Hussain, Roshidi bin Din, Mohd. Rushdi bin Idrus, (2018). Preserve Imperceptibility and Robustness Performance on Steganography Technique based on StegaSVM-Shifted LBS Model.
ICoBIC 2017
, 1018(1), 17 - 17.
Nazim Razali, Aida Mustapha, SUNARIYA UTAMA , Roshidi bin Din, (2018). A Review on Football Match Outcome Prediction Using Bayesian Network.
ICoBIC 2017
, 1020(1), 1 - 9.
Hafiza Samad, Hanizan S.H, Roshidi bin Din, Roslinda Murad, Asiah Tahir, (2018). Performance Evaluation of Web Application Server based on Request Bit per Second and Transfer Rate Parameters.
ICoBIC 2017
, 1018(1), 1 - 7.
Hanizan Shaker Hussain , Roshidi bin Din, Nik Zulkarnaen Khidzir, Khairul Azhar Mat Daud, Suzastri Ahmad, (2018). Risk and Threat via Online Social Network among Academia at Higher Education.
ICoBIC 2017
, 1018(1), 1 - 7.
Hanizan Shaker Hussain , Roshidi bin Din, (2017). Preserve Imperceptibility and Robustness Performance on Steganography Technique based on StegaSVM-Shifted LBS Model.
ICoBIC 2017
, 1018(1), 1 - 8.
Mohd Nizam Omar , Guled Yusuf Mihile Guled , Nur Haryani Binti Zakaria, Angela Amphawan, Roshidi bin Din, (2017). Home-Based Intrusion Detection System.
Journal of Telecommunication, Electronic and Computer Engineering
, 9(2-4), 107 - 111.
Hanizan Shaker Hussain, Roshidi bin Din, Aida Musthapa, Fawwaz Zamir Mansor, (2017). LSB Algorithm based on Support Vector Machine in Digital Image Steganography.
Journal of Telecommunication, Electronic and Computer Engineering
, 9(2-12), 13 - 18.
Roshidi bin Din, Massudi bin Mahmuddin, (2017). The performance evaluation of feature-based technique in text steganography.
Journal of Engineering Science and Technology
, SI(1), 169 - 180.
Hanizan Shaker Hussain , Roshidi bin Din, Hafiza A.S., A. Rukhiyah, Noor Maizatulshima S., (2017). A REVIEW OF ARTIFICIAL INTELLIGENCE TECHNIQUES IN IMAGE STEGANOGRAPHY DOMAIN.
Journal of Engineering Science and Technology
, 12(Special Issue), 103 - 113.
Nurul Syafidah Jamil, Ku Ruhana Binti Ku Mahamud, Aniza binti Mohamed Din, Faudziah Bt Ahmad, Noraziah binti Che Pa, Wan Hussain bin Wan Ishak, Roshidi bin Din, Farzana binti Kabir Ahmad, (2017). A Subject Identification Method based on Term Frequency Technique.
International Journal of Advanced Computer Research
, 7(30), 103 - 110.
Mazida Binti Ahmad, Merza Abbas, Roshidi bin Din, Mazni Binti Omar, Zaharah binti Abdul Rahman, (2016). The Visualization of SECI-based Internalization Process for Higher Learning Institution.
Advanced Science Letters
, 22(9), 1218 - 1221.
Mazida Binti Ahmad, Merza Abbas, Roshidi bin Din, Mazni Binti Omar, Zaharah binti Abdul Rahman, (2015). The visualization of socialization, externalization, combination, internalization-based internalization process for higher learning institution.
Advanced Science Letters
, 22(5-6), 1218 - 1221.
Roshidi bin Din, (2014). Designing the Key Detection of Text Steganalysis Based.
Advanced Science Letters
, 20(1), 158 - 163.
Baharudin Bin Osman, Roshidi bin Din, Mohd. Rushdi bin Idrus, (2015). CAPACITY PERFORMANCE OF STEGANOGRAPHY METHOD IN TEXT BASED DOMAIN.
ARPN Journal of Engineering and Applied Sciences
, 10(3), 1345 - 1351.
Roshidi bin Din, Faudziah Bt Ahmad, Hanizan Shaker Hussain, Shima Sabri, Nik Zulkarnaen Khidzir, Muzaaliff Musa, (2016). A performance of text steganalytic system using genetic-based method.
ARPN Journal of Engineering and Applied Sciences
, 11(10), 6216 - 6221.
Hanizan Shaker Hussain, Yaacob, H., Sabri, M., Azmer, A, Roshidi bin Din, (2015). A New Model of StegaSVM-Shifted LSB in DCT Domain on Image Steganography Approach.
Advanced Science Letters
, 21(10), 3234 - 3238.
Mohamad Farhan Bin Mohamad Mohsin, Faudziah Bt Ahmad, Aniza binti Mohamed Din, Ku Ruhana Binti Ku Mahamud, Roshidi bin Din, (2011). Suitability of Training Programme Based on Integrity Traits Identification. .
International Journal of Scientific & Engineering Research
, 12(2), 1 - 8.
Ku Ruhana Binti Ku Mahamud, Aniza binti Mohamed Din, Noraziah binti Che Pa, Farzana binti Kabir Ahmad, Faudziah Bt Ahmad, Roshidi bin Din, Wan Hussain bin Wan Ishak, (2014). OBJECT-BASED KNOWLEDGE REPRESENTATION OF FEMALE RELATED ISSUES FROM THE HOLY QURAN.
Journal of Information and Communication Technology
, 13(), 146 - 161.
Tuan Zalizam Bin Tuan Muda, Roshidi bin Din, Siti Sakira Binti Kamaruddin, Yuhanis binti Yusof, (2014). Colour Feature Based Analysis on Content-based Image Retrieval Techniques.
International Journal of Digital Content Technology and its Applications
, 8(3), 55 - 64.
Abdul Razak bin Rahmat, Azizah Bt Haji Ahmad, Rafidah Bt Abd Razak, Roshidi bin Din, Azizi bin Abas, (2013). Sustainability Model for Rural Telecenter Using Business Intelligence Technique .
International Journal of Social, Human Science and Engineering
, 7(12), 1356 - 1361.
Mohamad Farhan Bin Mohamad Mohsin, Faudziah Bt Ahmad, Aniza binti Mohamed Din, Ku Ruhana Binti Ku Mahamud, Roshidi bin Din, (2011). Suitability of Training Programme Based on Integrity Traits Identification.
International Journal of Scientific & Engineering Research
, 2(12), 1 - 8.
Mohd. Nizam Bin Omar, Angela Amphawan, Roshidi bin Din, (2013). A Stepping Stone Perspective to Detection of Network Threats.
International Journal of Applied Mathematics and Informatics
, 7(3), 97 - 106.
Roshidi bin Din, Azman Samsudin, Tuan Zalizam Bin Tuan Muda, P. Lertkrai, Angela Amphawan, Mohd. Nizam Bin Omar, (2013). Fitness Value Based Evolution AlgorithmApproach for Text Steganalysis Model.
International Journal of Mathematical Models and Methods in Applied Sciences
, 7(5), 551 - 558.
Angela Amphawan, Mohd. Nizam Bin Omar, Roshidi bin Din, (2012). An Integrated Priority-based Cell Attenuation Model for Dynamic Cell Sizing.
EURASIP Journal on Wireless Communications and Networking
, 2012(356), 1 - 11.
Roshidi bin Din, Azman Samsudin, Puriwat Lertkrai, (2012). A Framework Components for Natural Language Steganalysis.
International Journal of Computer Theory and Engineering
, 4(4), 641 - 645.
Roshidi bin Din, Zhamri bin Che Ani, AZMAN SAMSUDIN, (2012). A formulation of conditional states on steganalysis approach..
WSEAS TRANSACTIONS on MATHEMATICS
, 11(3), 173 - 182.
Mohd. Hasbullah bin Omar, Roshidi bin Din, Hatim B Mohamad Tahir, (2003). Smart Cards and The Fingerprint: A Framework For User Identification and Authentication.
Journal of Information and Communication Technology
, 2(1), 67 - 80.
RESEARCH PIE
LIST OF RESEARCH
ALPHA-BASED BINARY TECHNIQUE ON FEATURE-BASED METHOD IN TEXT STEGANOGRAPHY APPROACH (2023), Member, Universiti
A COMPUTING-BASED LEAKAGE DETECTION DESIGN ON WATER DISTRIBUTION SYSTEM FOR NON-REVENUE WATER PROBLEM: UUM'S CASE STUDY (2023), Member, Universiti
AN IMPROVED STEPPING STONE DETECTION METHOD FOR A FAST DETECTION MECHANISM FOR DENIAL OF SERVICE (2020), Member, Kpt
PEMBANGUNAN SISTEM ASNAF I-CARE (FASA 1): APLIKASI PENGURUSAN JUAL BELI PRODUK ASNAF KEDAH (2019), Member, Kementerian/agensi lain
RGB COLOURED QR CODE MODEL FOR STEGANOGRAPHY (2019), Member, Kpt
DEVELOPMENT OF PERFORMANCE EVALUATION MODEL FOR PUBLIC KEY CRYPTOGRAPHY (2019), Member, Kpt
DEVELOPING A NEW GOVERNANCE MATURITY MODEL FOR FOOD SECURITY REGULATORY AGENCIES USING ARTIFICIAL INTELLIGENCE (2019), Member, Kpt
PROOF OF CONCEPT STUDY OF ATSPAY CASHLESS SOLUTION IN UNIVERSITY UTARA MALAYSIA (2019), Member, Universiti
DATA BREACH PREVENTION MODEL FOR SECURING DATA PRIVACY AND CONFIDENTIALITY IN CLOUD COMPUTING USING ENHANCED AES (2019), Member, Kpt
INTEGRATED SINGLE BINARY TECHNIQUE FOR FEATURE-BASED TEXT STEGANOGRAPHY (2017), Member, Universiti
A New Embedding Technique Using Integrated Letter-based Algorithm in Text Steganography Domain (2016), Leader, Kpt
Mode-Wavelength Division Multiplexing For Separating Optical Network Units Into Virtual Point-To-Point Connections For Smart Services In Internet-Of-Things: Increasing Data Rates With Less Optical Fiber (2016), Member, Kpt
MODELING SECURED CERTIFICATE MECHANISM WITH CLOUD SERVICES (2016), Member, Universiti
Evaluation Integrated Techniques In Letter Based Steganography On Classified Documents (2016), Leader, Universiti
A NEW BLIND LINGUISTIC STEGANALYSIS MODEL BASED ON STYLOMETRIC APPROACH FOR HIGHER ACCURACY IN STEGO TEXT DIRECTION (2015), Member, Lain-lain
An Enhanced Measurement of Feature-Based Techniques in Steganography Method in Text Domain (2015), Member, Universiti
NOVEL SYMMETRIC ENCRYPTION SCHEME BASED ON TRUE RANDOM UMBERS AND CHAOTIC MAPS (2014), Member, Lain-lain
Model Steganalisis Teks Menggunakan Pendekatan Algoritma Genetik (2012), Leader, Universiti
Novel Modal Multiplexing Technique In Multimode Fiber (2012), Member, Kpt
Spam Detection Model Based On Stepping Stone Detection Approach (2012), Member, Kpt
Selective Excitation Using Photonic Crystal Fibre (2012), Member, Universiti
The Evaluation Of Steganography Methods On The Text Domain (2012), Member, Universiti
TOPIC IDENTIFICATION ALGORITHM FOR FEMALE RELATED TERM AND CONCEPTUAL GRAPH INTERCHANGE FORMAT REPRESENTATION FOR EXCEPTIONAL CLAUSE IN THE HOLY QURAN (2012), Member, Universiti
COMPARATIVE ANALYSIS OF CONTENT BASED IMAGE RETRIEVAL TECHNIQUES (2011), Member, Universiti
INVESTIGATING TEACHER'S INTEGRITY THROUGH ASSOCIATION RULE MINING (2011), Leader, Universiti
NETWORK RESPONSE TIME: CASE STUDY UUM ISLAN (2005), Member, Kpt
THE RELIABILITY OF ELECTRONIC COMMERCE SECURITY PROTOCOL (2003), Member, Universiti
A TAXONOMY OF SECURITY FAULTS IN THE WINDOW OPERATING SYSTEM (2002), Member, Universiti
ANALISIS RISIKO KE ATAS TEKNIK PENYEMBUNYIAN MAKLUMAT DALAM TEKS DAN IMEJ (2002), Leader, Universiti
PENILAIAN PRESTASI PELAKSANAAN PIAWAIAN ENKRIPSI TERKINI (AES) (2001), Member, Universiti
REKABENTUK SISTEM KURSUS SISTEM PENGOPERASIAN MENGGUNAKAN TEKNOLOGI MULTIMEDIA (2001), Member, Universiti
CONSULTATION
Year
Title
Membership
Funder
Level
Status
INTELLECTUAL PROPERTIES
Year
Reference No
IP Type
Title of Inventor (Principal Inventor/Member)
Status of IP
2020
20200125
Copyright
ASNAF I-CARE PROCESS FLOWCHART
- (
MEMBER
)
FILED
2017
20180023
Copyright
Flow Process of Sender /Receiver-Based Model for Public Key Steganography
- (
PRINCIPAL INVENTOR
)
FILED
2017
20180019
Copyright
Sender-Based Model of Public Key Steganography
- (
PRINCIPAL INVENTOR
)
FILED
2017
20180018
Copyright
Framework Natural Language Steganalysis
- (
PRINCIPAL INVENTOR
)
FILED
2017
20180016
Copyright
Algorithm for Feature Coding Technique in Text Steganography
- (
PRINCIPAL INVENTOR
)
FILED
2017
20180015
Copyright
Algoritm Fitness Value for Genetic Algorithm Detector
- (
PRINCIPAL INVENTOR
)
FILED
2017
20180014
Copyright
Receiver-Based Model of Public Key Steganography
- (
PRINCIPAL INVENTOR
)
FILED
2017
20180013
Copyright
Public Key Infrastructure of Receiver-Based Model
- (
PRINCIPAL INVENTOR
)
FILED
2017
20180012
Copyright
Evalution Measurement Design for Hybrid Detection Model
- (
PRINCIPAL INVENTOR
)
FILED
2017
20180011
Copyright
Public Key Infrastructure of Sender-Based Model
- (
PRINCIPAL INVENTOR
)
FILED
2017
20180010
Copyright
Mathematical Formulation of Text Genome
- (
PRINCIPAL INVENTOR
)
FILED
2017
20180009
Copyright
Setup Process of Matching Word Genetic Algorithm Detector
- (
PRINCIPAL INVENTOR
)
FILED
2017
20180008
Copyright
Mathematical Formulation Key Used in Text Steganography
- (
PRINCIPAL INVENTOR
)
FILED
2017
20180001
Copyright
Public Key Infrastructure of Client-Based Model
- (
PRINCIPAL INVENTOR
)
FILED
2017
20170094
Copyright
Setup Process of Matching Sentence Genetic Algorithm Detector
- (
PRINCIPAL INVENTOR
)
FILED
2017
20170093
Copyright
Hybrid Model for Text Steganography System
- (
PRINCIPAL INVENTOR
)
FILED
2017
20170072
Copyright
Algorithm Flow for Public Key Steganography Model
- (
PRINCIPAL INVENTOR
)
FILED
2017
20170071
Copyright
Model of Stego-Based Seci
- (
PRINCIPAL INVENTOR
)
FILED
2017
20170070
Copyright
Design of Single Stego Binary (SSB) System
- (
PRINCIPAL INVENTOR
)
FILED
2017
20170069
Copyright
Algorithm Embedding of Letter-Based Steganography
- (
PRINCIPAL INVENTOR
)
FILED
2017
20170068
Copyright
StackGo SingLe BinNary (SSB) System
- (
PRINCIPAL INVENTOR
)
FILED
2017
20170067
Copyright
Setup Process of Embeding and Extracting on Letter-Based in Text Steganography
- (
PRINCIPAL INVENTOR
)
FILED
2017
20170066
Copyright
Verification and Validation Model in Text Steganography
- (
PRINCIPAL INVENTOR
)
FILED
2017
20170065
Copyright
Model of Text-Based Steganogaphy
- (
PRINCIPAL INVENTOR
)
FILED
2014
20140044
Copyright
The Evaluation Of Steganography Methods On The Text Domain
- (
MEMBER
)
FILED
UNDERGRADUATE
Course Code
Course Name
STQM2103
Discrete structure
SCQM1103
Discrete mathematics
TD1013
Information systems in organisation
TD1113
Introduction to information system development
TZ3998
Project
TIJ2013
Data communication
TIK1013
Computer system organization
STIJ3134
Network & system security
TK2023
Computer system architecture
STIK1014
Computer system organization
TID1013
Information system in organization
TS1013
Introduction to statistics
TA2014
Programming languages
STQM1203
Mathematics for information technology
SKIP3013
Concept and paradigma in programming languages
STIX3912
Practicum
STIN2063
Machine learning
TJ2013
Data communication
STIK2024
Computer system architecture
STIN2064
Machine learning
TJ3134
Network and system security
STIA2023
Data structure & algorithm analysis
TQM2103
Discrete structure
VGA041
Media technology iv
VTA011
Creativity i
VTA021
Creativity ii
VGA011
Media technology i
VGA021
Media technology ii
VGA031
Media technology iii
VTA031
Creativity iii
VTA041
Creativity iv
TIX3998
Practicum
EEP2032
Living in the multi-cultural society
STIN1013
Introduction to artificial intelligence
POSTGRADUATE
Course Code
Course Name
STIJ6014
Network security
SUPERVISION
Matric
Name
Status
Title
82188
Mohd Hasbullah bin Omar
Completed
Smart Cards and the Fingerprint a Proposed Framework for the Automatic Teller Machine (ATM) System
82356
Mohamad Amir Abu Seman
Completed
The Performance of User Verification Using Two Fingerprint Based on Error Rate
82357
Ahmad Hanis Mohd Shabli
Completed
Pemulihan Imej Cap Jari Menggunakan Gabungan Teknik Paras Kelabu dan Paras Dedua
84245
Muhamad Arif Hashim
Completed
Pendekatan Efisien Untuk Menyembunyikan Maklumat Dalam Bahasa Melayu Menggunakan Kaedah Steganografi
807727
Puriwat Lertkrai
Completed
A Detection Method for steganalysis using Evaluation Alghorithm (EA) Approach
808975
Mohamad Zamhari bin Tahir
Completed
A Conceptual Design Of Detected Key On Text Steganalysis-Based
813028
Siti Norussaadah binti Mohd Salleh
Completed
A Detection Design of Formulated Key Used on Text Steganalysis Method
816468
Siti Marahaini binti Mahamood
Completed
AN INTEGRATED ALGORITHM DESIGN FOR PRIMITIVE BLOCK CIPHER
817054
Yuriati binti Yusof
Completed
PUBLIC KEY CRYTOGRAPHY SYSTE M USING OCTAL BASED SCHEME
817603
Nor Arliza binti Abdullah
Completed
PUBLIC KEY STEGANOGRAPHY BASED ON OCTAL DIGIT SCHEME IN TEXT DOMAIN
822691
FAWWAZ ZAMIR BIN MANSOR
Not Active
A New Substitution-Based Algorithm for Lingistic Steganography Using Antonym
822692
Muhammad Nazim bin Razali
Not Active
Dynamic Bayesian Networks for Predicting Number of Goals Scored Based On Player Forms
823082
SITI MUNIRA BINTI SAMSUDIN
Not Active
Performance Analysis On Feature-Based Scheme In Text Steganography Method
824193
Syiham Binti Mohd Lokman
Not Active
Blind Linguistics Steganalysis Against Translation Based Steganography Using Stylometry Approcah
824194
Suhaibah Binti Jusoh
Not Active
Arabic Language Text Steganorgraphy based on Synonym Substitution with Two-Gram Dependency Collocations
901083
Jasmin Ilyani binti Ahmad
Not Active
An Abstraction Model for Text Steganography
901151
Nor Hafizah binti Abdul Razak
Not Active
Integration Model of Steganalysis System using Computational Intelligence Method
901324
TENDAI ZENGENI
Completed
Simulation of Elliptical Core Few Mode Fiber Switch in Mode Division Multiplexing for Enhancing Bandwidth Performance
901429
Siti Norussaadah binti Mohd Salleh
Active
A Detection Framework for Natural Linguistic Steganography Systems
901961
ALAA JABBAR QASIM AL-MALIKI
Active
Compressed Least Significant bit Techniques on Image Steganography
902335
Raihan Sabirah Binti Mohd Sabri
Not Active
Behind Phishing: Fake or Genuine (Target Victim & Overcome)
902955
SUNARIYA UTAMA
Active
An Enhancement Measurement of Feature-based Techniques in Text Steganography Method
903293
MOHD HILAL BIN MUHAMMAD
Not Active
Real Time Crowd Monitoring System Using Wireless Photoelectric Sensor to Estimate Number of People in Makkah Al-Mukarramah
903419
FARAH QASIM AHMED AL-YOUSUF
Active
Multi-Binary Scheme Letter Based Technique Performance Using AES in Text Steganography Method
95611
Faisal Shahzad
Not Active
Data Breach Prevention (DBP) Model using Advance Encryption Standard (AES) Technique in Cloud Security Domain
814915
Reema Ahmed Abdalla Bin Thabit
Completed
RAID-BIT Method to Improve the Performance of Arabic Text Steganography
816991
Nor Izham bin Subri
Completed
Distributed Denial of Service Detection using Stepping Stone Detection Method in Internet Control Message Protocol Attack
817462
Sunariya Utama
Completed
Design of Evaluation Procedures for Letter-Based Techniques in Text Steganography Method
817609
Puteri Nurul'Ain Adil binti Md Sabri
Completed
Octal Digit Scheme Public Key Cyptography Technique
901912
MUHAMAD ARIF BIN HASHIM
Not Active
DATA SECURITY MODEL BASED ON COMPUTATIONAL INTELLIGENCE METHODS FOR CLOUD COMPUTING ENVIRONMENT